Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:19
Static task
static1
Behavioral task
behavioral1
Sample
42cb5ed776688407e2798c156ce18630.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
42cb5ed776688407e2798c156ce18630.exe
Resource
win10v2004-20231215-en
General
-
Target
42cb5ed776688407e2798c156ce18630.exe
-
Size
165KB
-
MD5
42cb5ed776688407e2798c156ce18630
-
SHA1
a47d4e9f396215ba8bf503b5a37b8aa1897d8267
-
SHA256
2045a18bc2a200fe7f70508177b5b7e4204017e8faad69318f73c5549021f79d
-
SHA512
0c67ded7a8c4baecac211c7f1ea93d1bd20b38e86245d117bf607e4a03e72d3729c8a5cbc4b9af1eb7e37d0c11c6a124a2019a4212498c3c0baf8ae13ae3dc35
-
SSDEEP
3072:eOcJS/WJbzErTMmEmdlzlPwumhWXYzdk7X4nc7UiSYbbbLrByXUySY0vDJfqObhY:eOr/WJbzErTMmEmdFlPwumhWXYRk7X49
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 1736 42cb5ed776688407e2798c156ce18630.exe -
Executes dropped EXE 1 IoCs
pid Process 1736 42cb5ed776688407e2798c156ce18630.exe -
Loads dropped DLL 1 IoCs
pid Process 2656 42cb5ed776688407e2798c156ce18630.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2656 42cb5ed776688407e2798c156ce18630.exe -
Suspicious use of UnmapMainImage 2 IoCs
pid Process 2656 42cb5ed776688407e2798c156ce18630.exe 1736 42cb5ed776688407e2798c156ce18630.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2656 wrote to memory of 1736 2656 42cb5ed776688407e2798c156ce18630.exe 16 PID 2656 wrote to memory of 1736 2656 42cb5ed776688407e2798c156ce18630.exe 16 PID 2656 wrote to memory of 1736 2656 42cb5ed776688407e2798c156ce18630.exe 16 PID 2656 wrote to memory of 1736 2656 42cb5ed776688407e2798c156ce18630.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\42cb5ed776688407e2798c156ce18630.exe"C:\Users\Admin\AppData\Local\Temp\42cb5ed776688407e2798c156ce18630.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: RenamesItself
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\42cb5ed776688407e2798c156ce18630.exeC:\Users\Admin\AppData\Local\Temp\42cb5ed776688407e2798c156ce18630.exe2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious use of UnmapMainImage
PID:1736
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
165KB
MD5962087c2454e87d18ba913e2e9aee003
SHA12e30a4367e495b39715cbcac4905961553a2c4bf
SHA256f7ac3ffe90d9c262f4edba1bf21c1a6cfeef1f6e4640282b252b25d642a513da
SHA51285ee5cdae15355d7c6f1d88d38ff136b4617d7d3bf3c3f26d6dc7b05fe9da0debd2ca8bd030615b3596b43b74ad757c67db07a61f3224238aae062278382603d